US 7548988 B2
A software distribution architecture having a television broadcast system as its infrastructure. Software from a software repository (1600) is mixed into a television broadcast system and transmitted into one or more selected channels at prescribed dates and times. An at-home subscriber, capable of receiving with a receiver (1608) the one or more select channels, switches to the one or more channels carrying the software distribution with a channel selector (1611). The subscriber, having programmed a controller (1616) with a programmer (1620) for the date, time, software ID, and channel of the software broadcast, then downloads the software package to a storage device (1622) for ultimate transfer to a PC (1624). A validation and accounting system (1628) then records the software download transaction and transmits this information over a PSTN (1632) to a provider accounting system (1630) such that the subscriber is billed for the software package which was downloaded.
1. A method for distributing software, comprising the steps of:
receiving broadcast information at a receiver of a user from a broadcast distribution system having one or more broadcast channels for broadcasting the broadcast information;
wherein select ones of the one or more broadcast channels are designated for the transmission of one or more discrete software data streams;
wherein the one or more discrete software data streams are received over the select ones of the one or more broadcast channels at a scheduled time, each of the one or more discrete software data streams having a unique ID associated therewith, which unique ID for each of the one or more discrete software streams is associated therewith by an associated software vendor and each of the unique IDs is unique to a user;
the user associated with a monitoring interface of the user that is connected to the receiver, the unique ID associated with that user and a desired one of the one or more discrete software streams;
selecting, in the monitoring interface associated with the user, selected ones of the one or more discrete software data streams according to the respective unique IDs for download via the receiver;
downloading the selected one or more discrete software data streams to a user storage device during the scheduled time for use by the user, the user storage device connected to the receiver through the monitoring interface; and
deleting the unique ID from the monitoring interface for each of the one or more discrete software data streams downloaded after downloading thereof.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
10. The method of
11. The method of
12. The method of
13. The method of
14. The method of
15. The method of
16. A system for distributing software, comprising:
a broadcast distribution system having one or more broadcast channels for broadcasting information to a receiver of a user;
one or more discrete software data streams designated for transmission on select ones of said one or more broadcast channels, each of the one or more discrete data streams having a unique ID associated therewith, which unique ID for each of the one or more discrete software streams is associated therewith by an associated software vendor and each of the unique IDs is unique to a user;
a user storage device associated with the user and connected to said receiver through a monitoring interface and said user storage device operable to store both one or more of the unique IDs associated with the user prior to downloading of the one or more discrete software data streams and, after downloading thereof, for storing said downloaded one or more discrete software data streams wherein each of said unique IDs stored in said user interface is stored there by the user;
wherein said one or more discrete software data streams are transmitted over said select ones of said one or more broadcast channels at a scheduled time, each of said one or more discrete software data streams having associated therewith the associated one of said unique IDs; and
wherein said select ones of said one or more discrete software data streams are downloaded via said receiver to said monitoring interface for filtering the select ones of the one or more of the discrete software data streams according to said respective unique IDs, and wherein said unique ID for each of the one or more discrete software data streams downloaded deleted from the user storage device after downloading thereof.
17. The system of
18. The system of
19. The system of
20. The system of
21. The system of
22. The system of
23. The system of
24. The system of
25. The system of
26. The system of
27. The system of
28. The system of
29. The system of
30. The system of
This application is a Continuation of U.S. patent application Ser. No. 09/417,863, entitled “SOFTWARE DOWNLOADING USING A TELEVISION BROADCAST CHANNEL,” filed on Oct. 13, 1999, now U.S. Pat. No. 7,370,114, issued on May 6, 2008, which is a Continuation-in-Part of U.S. Pat. No. 6,098,106, entitled “METHOD FOR CONTROLLING A COMPUTER WITH AN AUDIO SIGNAL,” issued on Aug. 1, 2000; the specifications of which are incorporated herein by reference.
This invention is related to a method for downloading software using a television broadcast channel.
With the enormous number of users connecting online to access a wide variety of products and services, network bandwidth is becoming a limiting factor in providing these products and services. The typical connection mode for home users is a 56K analog modem which is sufficient for surfing various web sites of interest by the user but is becoming increasingly prohibitive for network traffic that comprises streaming audio, video and lengthy file downloads. Conventional software distribution methods include providing hard copy manuals and distribution media such as floppy diskettes, and more recently, compact disks (CDs) which contain the software application files and electronic versions of the manuals.
More recently, vendors have moved to offering for purchase software applications and electronic manuals by direct download from vendor websites over a global communication network (commonly known as the Internet). This introduces enormous cost savings for the vendor by eliminating any paper costs, distribution costs, and media costs incurred by conventional methods of distribution. However, this method of distribution is very time consuming for a user who has a low bandwidth analog connection (e.g., 33K and 56K) and can even be prohibitive for those who have the more recent digital connections such as digital subscriber line (DSL) and cable modems which operate in the megabyte download regime. For example, where operating systems or application bundles contain many applications, the file sizes can approach 500 megabytes or more. Download of a file this size using a 56K modem will take many hours at best, and ties up the user's telephone line, if they have only the single telephone line to connect to the network. Furthermore, the download process can be interrupted by any number of causes such as power interruptions, connection problems, etc., making such a download prospect tedious, if not nearly impossible. Therefore such massive downloads, as seems to be the current trend in software distribution, may very well be prohibitive for most users having analog connections, and even those coming online today in the presence of newer and more faster connection technologies such as DSL and cable modems.
Another headache related to existing on-line distribution methods is that vendor servers can handle only a fixed number of users who are accessing the server for a download. Therefore, users must “stand in line” to gain access to the server in order to initiate a lengthy download of the software. Thus distribution of one or more applications on the same server or even dedicated application distribution servers can be a tedious process for the user and impacting customer relations with the vendor.
Current on-line payment methods also are not well established to where the customer believes his or her account information is secure and will not be compromised during its transmission to the software vendor. Therefore, the public-switched telephone network (PSTN) remains the only secure accepted method for transmitting such account information.
However, the infrastructure exists to handle such massive download capabilities. The existing broadcast television and cable industry has such an infrastructure in place at this time. The high bandwidth of such a system would alleviate any lengthy download problems by saving many hours of dedicated connection time required for most user having analog connections. Additionally, the process would be painless for the user since programming to download a broadcast software distribution is very similar to using existing video tape recorders to record a television program. The user need not be present during the download process as it would be accomplished automatically. Furthermore, such broadcast industry also has in place the accounting and billing systems to automatically bill the user according to any particular software that may be downloaded across a broadcast channel. Therefore, it is desirable that the television broadcast infrastructure be used to distribute software to the user.
The invention disclosed and claimed herein is a method for distributing software. A television broadcast distribution system is provided having one or more broadcast channels for broadcasting analog and digital television information to a receiver of a user. Select ones of the one or more broadcast channels are designated for the transmission of one or more software data streams. The software data streams are transmitted over the select ones of the one or more broadcast channels at a scheduled time, each of the one or more software data streams having a unique ID associated therewith. One or more of the software data streams are selected for download via the receiver according to the respective unique ID. The selected one or more software data streams are downloaded via the receiver to a user storage device during the scheduled time.
For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following description taken in conjunction with the accompanying Drawings in which:
Referring now to
On the receive side of the system, a conventional receiver 110, such as a television is provided. This television provides a speaker output which provides the user with an audible signal. This is typically associated with the program. However, the receiver 110 in the disclosed embodiment, also provides an audio output jack, this being the type RCA jack. This jack is utilized to provide an audio output signal on a line 113 which is represented by an audio signal 111. This line 113 provides all of the audio that is received over the communication link 108 to the PC 112 in the audio input port on the PC 112. However, it should be understood that, although a direct connection is illustrated from the receiver 110 to the PC 112, there actually could be a microphone pickup at the PC 112 which could pick the audio signal up. In the disclosed embodiment, the audio signal generated by the advertiser data input device 100 is audible to the human ear and, therefore, can be heard by the user. Therefore, no special filters are needed to provide this audio to the PC 112.
The PC 112 is operable to run programs thereon which typically are stored in a program file area 116. These programs can be any type of programs such as word processing programs, application programs, etc. In the disclosed embodiment, the program that is utilized in the system is what is referred to as a “browser.” The PC 112 runs a browser program to facilitate the access of information on the network, for example, a global communication network known as the “Internet” or the World-Wide-Web (“Web”). The browser is a hypertext-linked application used for accessing information. Hypertext is a term used to describe a particular organization of information within a data processing system, and its presentation to a user. It exploits the computer's ability to link together information from a wide variety of sources to provide the user with the ability to explore a particular topic. The traditional style of presentation used in books employs an organization of the information which is imposed upon it by limitations of the medium, namely fixed sized, sequential paper pages. Hypertext systems, however, use a large number of units of text or other types of data such as image information, graphical information, video information, or sound information, which can vary in size. A collection of such units of information is termed a hypertext document, or where the hypertext documents employ information other than text, hypermedia documents. Multimedia communications may use the Hypertext Transfer Protocol (“HTTP”), and files or formatted data may use the Hypertext Markup Language (“HTML”). This formatting language provides for a mingling of text, graphics, sound, video, and hypertext links by “tagging” a text document using HTML. Data encoded using HTML is often referred to as an “HTML document,” an “HTML page,” or a “home page.” These documents and other Internet resources may be accessed across the network by means of a network addressing scheme which uses a locator referred to as a Uniform Resource Locator (“URL”), for example, “http://www.digital.com.”
The Internet is one of the most utilized networks for interconnecting distributed computer systems and allows users of these computer systems to exchange data all over the world. Connected to the Internet are many private networks, for example, corporate or commercial networks. Standard protocols, such as the Transport Control Protocol (“TCP”) and the Internet Protocol (“IP”) provide a convenient method for communicating across these diverse networks. These protocols dictate how data are formatted and communicated. As a characteristic of the Internet, the protocols are layered in an IP stack. At higher levels of the IP stack, such as the application layer (where HTTP is employed), the user information is more readily visible, while at lower levels, such as the network level (where TCP/IP are used), the data can merely be observed as packets or a stream of rapidly moving digital signals. Superimposed on the Internet is a standard protocol interface for accessing Web resources, such as servers, files, Web pages, mail messages, and the like. One way that Web resources can be accessed is by browsers made by Netscape® and Microsoft Internet Explorer®.
Referring again now to
By utilizing the system described herein with respect to the disclosed embodiment of
Referring now to
The web browser running on PC 204, and communicating to the network through an internal modem 208, in this embodiment, transmits the advertiser information to the remote server. The remote server cross-references the advertiser product information to the address of the advertiser server located on the network. The address of the advertiser server is routed back through the PC 204 web browser to the advertiser server. The advertiser product information is returned to PC 204 to be presented to the viewer on display 118. In this particular embodiment, the particular advertiser product information displayed is contained within the advertiser's web page 212. As mentioned above, the audio signal is audible to the human ear. Therefore the audio signal, as emitted from the TV speakers, may be input to the sound card 206 via a microphone. Furthermore, the audio signal need not be a real-time broadcast, but may be on video tapes, CDs, DVD, or other media which may be displayed at a later date. With the imminent implementation of high definition digital television, the audio signal output from the TV may also be digital. Therefore, direct input into a sound card for A/D purposes may not be necessary, but alternative interfacing techniques to accommodate digital-to-digital signal formats would apply.
Referring now to
Connected to the ARS 308 is a database 310 of product codes and associated manufacturer URLs. The database 310 undergoes a continual update process which is transparent to the user. As companies sign-on, i.e., subscribe, to this technology, manufacturer and product information is added to the database 310 without interrupting operation of the source PC 302 with frequent updates. When the advertiser server address URL is obtained from the ARS database 310, it and the request for the particular advertiser product information are automatically routed back through the web browser on PC 302, over to the respective advertiser server for retrieval of the advertiser product information to the PC 302. It should be noted that although the disclosed invention discusses a global communication network, the system is also applicable to LANs, WANs, and peer-to-peer network configurations. Additionally, the disclosed architecture is not limited to a single source PC 302, but may comprise a plurality of source PCs, e.g., PC 300 and PC 303. Moreover, a plurality of ARS 308 systems and advertiser servers 312 may be implemented, e.g., ARS 314, and advertiser server A 316, respectively.
The information transactions, in general, which occur between the networked systems of this embodiment, over the communication network, are the following. The web browser running on source PC 302 transmits a message packet to the ARS 308 over Path “A.” The ARS 308 decodes the message packet and performs a cross-reference function with product information extracted from the received message packet to obtain the address of an advertiser server 312. A new message packet is assembled comprising the advertiser server 312 address, and sent back to the source PC 302 over Path “B.” A “handoff” operation is performed whereby the source PC 302 browser simply reroutes the information on to the advertiser server 312 over Path “C,” with the appropriate source and destination address appended. The advertiser server 312 receives and decodes the message packet. The request-for-advertiser-product-information is extracted and the advertiser 312 retrieves the requested information from its database for transmission back to the source PC 302 over Path “D.” The source PC 302 then processes the information, i.e., for display to the viewer. The optional Path “E” is discussed hereinbelow. It should be noted that the disclosed methods are not limited to only browser communication applications, but may accommodate, with sufficient modifications by one skilled in the art, other communication applications used to transmit information over the Internet or communication network.
Referring now to
Upon receipt of the message packet 400 from source PC 302, ARS 308 processes the information in accordance with instructions embedded in the overhead information. The ARS 308 specifically will extract the product code information from the received packet 400 and, once extracted, will then decode this product code information. Once decoded, this information is then compared with data contained within the ARS advertiser database 310 to determine if there is a “hit.” If there is no “hit” indicating a match, then information is returned to the browser indicating such. If there is a “hit,” a packet 402 is assembled which comprises the address of the source PC 302, and information instructing the source PC 302 as to how to access, directly in a “handoff” operation, another location on the network, that of an advertiser server 312. This type of construction is relatively conventional with browsers such as Netscape® and Microsoft Internet Explorer® and, rather than displaying information from the ARS 308, the source PC 302 can then access the advertiser server 312. The ARS 308 transmits the packet 402 back to source PC 302 over Path “B.” Referring now to
Upon receipt of the message packet 402 by the source PC 302, the message packet 402 is disassembled to obtain pertinent routing information for assembly of a new message packet 404. The web browser running on source PC 302 is now directed to obtain, over Path “C,” the product information relevant to the particular advertiser server 312 location information embedded in message packet 404. Referring now to
Upon receipt of the message packet 404 from source PC 302, advertiser server 312 disassembles the message packet 404 to obtain the request-for-product-information data. The advertiser server 312 then retrieves the particular product information from its database, and transmits it over Path “D” back to the source PC 302. Referring now to
Optionally, the ARS 308 may make a direct request for product information over Path “E” to advertiser server 312. In this mode, the ARS 308 sends information to the advertiser server 312 instructing it to contact the source PC 302. This, however, is unconventional and requires more complex software control. The message packet 408 for this transaction is illustrated in
Referring now to
The user may obtain the benefits of this architecture by simply downloading the proprietary software over the network. Other methods for obtaining the software are well-known; for example, by CD, diskette, or pre-loaded hard drives.
Referring now to
Referring now to
Referring now to
Referring now to
The audio information is then routed to a PC 906, which is similar to the PC 112 in
Referring now to
Referring now to
Referring now to
Referring now to
The ARS 308, which basically constitutes the PC 1004 of
The associated ID 1304 that is transmitted along with the routing information in primary routing information 904 is then compared with the profile database 1308 to determine if a profile associated therewith is available. This information is stored in a transaction database 1310 such that, at a later time, for each routing code received in the form of the information in primary routing information 904, there will associated therewith the IDs 1304 of each of the PCs 906. The associated profiles in database 1308, which are stored in association with IDs 1304, can then be assembled and transmitted to a subscriber as referenced by a subscriber node 1312 on the network 910. The ARS 308 can do this in two modes, a realtime mode or a non-realtime mode. In a realtime mode, each time a PC 906 accesses the advertiser database 310 of the ARS 308, that user's profile information is uploaded to the subscriber node 1312. At the same time, billing information is generated for that subscriber 1312 which is stored in a billing database 1316. Therefore, the ARS 308 has the ability to inform the subscriber 1312 of each transaction, bill for those transactions, and also provide to the subscriber 1312 profile information regarding who is accessing the particular product advertisement having associated therewith the routing information field 904 for a particular routing code as described hereinabove. This information, once assembled, can then be transmitted to the subscriber 1312 and also be reflected in billing information and stored in the billing information database 1316.
Referring now to
Once all of the information is collected, in either the basic mode or the more specific mode, the program will then flow to a function block 1412 where this information is stored locally. The program then flows to a decision block 1414 to then go on-line to the host or the ARS 308. In general, the user is prompted to determine whether he or she wants to send this information to the host at the present time or to send it later. If he or she selects the “later” option, the program will flow to a function block 1415 to prompt the user at a later time to send the information. In the disclosed embodiment, the user will not be able to utilize the software until the profile information is sent to the host. Therefore, the user may have to activate this at a later time in order to connect with the host.
If the user has selected the option to upload the profile information to the host, the program will flow to the function block 1416 to initiate the connect process and then to a decision block 1418 to determine if the connection has been made. If not, the program will flow along a “N” path to decision block 1420 which will timeout to an error block 1422 or back to the input of the connect decision block 1418. The program, once connected, will then flow along a “Y” path from decision block 1418 to a function block 1428 to send the profile information with the ID of the computer or user to the host. The ID is basically, as described hereinabove, a “cookie” in the computer which is accessed by the program when transmitting to the host. The program will then flow to a function block 1430 to activate the program such that it, at later time, can operate without requiring all of the setup information. In general, all of the operation of this flowchart is performed with a “wizard” which steps the user through the setup process. Once complete, the program will flow to a Done block 1432.
Referring now to
The profile information can be transmitted back to the subscriber or manufacturer in the node 312 in realtime or non-realtime. A decision block 1512 is provided for this, which determines if the delivery is realtime. If realtime, the program will flow along a “Y” path to a function block 1514 wherein the information will be immediately forwarded to the manufacturer or subscriber. The program will then flow to a function block 1516 wherein the billing for that particular manufacturer or subscriber will be updated in the billing database 1316. The program will then flow into an End block 1518. If it was non-realtime, the program moves along the “N” path to a function block 1520 wherein it is set for a later delivery and it is accrued in the transaction database. In any event, the transaction database will accrue all information associated with a particular routing code.
With a realtime transaction, it is possible for a manufacturer to place an ad in a magazine or to place a product on a shelf at a particular time. The manufacturer can thereafter monitor the times when either the ads are or the products are purchased. Of course, they must be scanned into a computer which will provide some delay. However, the manufacturer can gain a very current view of how a product is moving. For example, if a cola manufacturer were to provide a promotional advertisement on, for example, television, indicating that a new cola was going to be placed on the shelf and that the first 1000 purchasers, for example, scanning their code into the network would receive some benefit, such as a chance to win a trip to some famous resort in Florida or some other incentive, the manufacturer would have a very good idea as to how well the advertisement was received. Further, the advertiser would know where the receptive markets were. If this advertiser, for example, had placed the television advertisement in ten cities and received overwhelming response from one city, but very poor response from another city, he would then have some inclination to believe that either one poor response city was not a good market or that the advertising medium he had chosen was very poor. Since the advertiser can obtain a relatively instant response and also content with that response as to the demographics of the responder, very important information can be obtained in a relatively short time.
It should be noted that the disclosed embodiment is not limited to a single source PC 302, but may encompass a large number of source computers connected over a global communication network. Additionally, the embodiment is not limited to a single ARS 308 or a single advertiser server 312, but may include a plurality of ARS and advertiser systems, indicated by the addition of ARS 314 and advertiser server A 316, respectively. It should also be noted that this embodiment is not limited only to global communication networks, but also may be used with LAN, WAN, and peer-to-peer configurations.
It should also be noted that the disclosed embodiment is not limited to a personal computer, but is also applicable to, for example, a Network Computer (“NetPC”), a scaled-down version of the PC, or any system which accommodates user interaction and interfaces to information resources.
One typical application of the above noted technique is for providing a triggering event during a program, such as a sport event. In a first example, this may be generated by an advertiser. One could imagine that, due to the cost of advertisements in a high profile sports program, there is a desire to utilize this time widely. If, for example, an advertiser contracted for 15 seconds worth of advertising time, they could insert within their program a tone containing the routing information. This routing information can then be output to the user's PC which will cause the user's PC to, via the network, obtain information from a remote location typically controlled by the advertiser. This could be in the form of an advertisement of a length longer than that contracted for. Further, this could be an interactive type of advertisement. An important aspect to the type of interaction between the actual broadcast program with the embedded routing information and the manufacturer's site is the fact that there is provided in the information as to the user's PC and a profile of the user themselves. Therefore, an advertiser can actually gain realtime information as to the number of individuals that are watching their particular advertisement and also information as to the background of those individuals, demographic information, etc. This can be a very valuable asset to an advertiser.
In another example, the producer of the program, whether it be an on-air program, a program embedded in a video tape, CD-ROM, DVD, or a cassette, can allow the user to automatically access additional information that is not displayed on the screen. For example, in a sporting event, various statistics can be provided to the user from a remote location, merely by the viewer watching the program. When these statistics are provided, the advertiser can be provided with demographic information and background information regarding the user. This can be important when, for example, the user may record a sports program. If the manufacturer sees that this program routing code is being output from some device at a later time than the actual broadcast itself, this allows the advertisers to actually see that their program is still being used and also what type of individual is using it. Alternatively, the broadcaster could determine the same and actually bill the advertiser an additional sum for a later broadcast. This is all due to the fact that the routing information automatically, through a PC and a network, will provide an indication to the advertiser for other intermediary regarding the time at which the actual information was broadcast.
The different type of medium that can be utilized with the above embodiment are such things as advertisements, which are discussed hereinabove, contests, games, news programs, education, coupon promotional programs, demonstration media (demos), photographs, all of which can be broadcast on a private site or a public site. This all will provide the ability to allow realtime interface with the network and the remote location for obtaining the routed information and also allow for realtime billing and accounting.
Referring now to
The received signals at the output of the receiver 1608 are input to a channel selector unit 1611 which may be part of the receiver 1608 or a separate chassis. The channel selector unit 1611 provides the function of allowing the subscriber to select from one or more channels (1, 2, 3, . . . , N) provided by the broadcast system. The selector unit 1611 has a multi-channel output TV 1612 which connects to the subscriber's TV, and a multi-channel software output 1614 which connects to a channel “listening” interface 1616, for the filtering of selected software channels for software distributions. The listening interface 1616 receives commands from a controller 1618 which is programmed with a programmer module 1620 by the subscriber with several parameters, one of which is time of the availability of the desired software on the broadcast channel. The programmable module 1620 can be a remote control unit used like conventional remote control units for programming a video tape recorder (VTR) and a cable box.
The listening interface 1616 is operable to monitor all data traffic carried on any of the software distribution channels. The provider broadcasts selected software distributions over the respective software channels for all interested subscribers to download. The disclosed architecture simply provides broadcasting of the software distributions on a regular basis and the subscriber selects the desired download(s). There is no interaction (or confirmation) required from the subscriber to the provider prior to obtaining the desired download(s). Conventional digital pay-per-view systems operate in a number of different ways. One method is to allow the subscriber to select the program of choice along with a personal authorization code. The personal authorization code is then transmitted to the provider prior to allowing the subscriber to view the program, which program is broadcast once per specific time period. Another conventional method is offered where the subscriber enters the same program and personal code information, but upload of this information is performed on a daily or monthly basis to the provider from the cable box so that the proper charges can be made and billed to the subscriber. This upload can be through the cable medium for a two-way system, or it can utilize a telephone connection in a dial-up mode.
Individual software distributions which have been broadcast at the source are uniquely identified with header information comprising at least a unique ID. Therefore, a subscriber which selects a particular software distribution for download, inputs the respective unique ID into the programmer 1620. Other parameters entered can include the date the software will be broadcast, the time of the day when it will be broadcast, and the particular channel on which it will be available for download.
After filtering the selected software distribution for download, the selected data is stored on a storage device 1622. The storage device 1622 may be any of a number of architectures commonly used for storing software distributions. For example, the storage device 1622 can be a removable hard drive which engages the set-top receiver box, and can be removed for compatible insertion into a subscriber's computer 1624. Alternatively, the user PC 1624 can connect directly to the storage device 1622 via the controller 1618 over a communication link 1626 for transfer of the downloaded software. The communication link 1626 between the computer 1624 and the set-top box is a high speed link such as a universal serial bus (USB) or a high-performance serial bus (IEEE 1394-type). The storage device 1622 can also consist of memory (e.g., a RAM drive) for accommodating the high speed downloads provided by the TV broadcast system. Once the download has completed, a flag is set such that the user system no longer initiates a download of the currently stored software. Alternatively, the user can program the system to store everything broadcast on that channel during a specific time period and forego the selection process of choosing only selected software distributions for download. The subscriber is then charged accordingly. The download capabilities for obtaining the desired software operate in the background in that the user may view a TV program on a first channel while the software distribution download process occurs on a second channel. The controller 1618 also incorporates an error-checking feature which ensures that the downloaded software arrives free of errors.
The programmer 1620 connects to a validation and accounting unit 1628 for recording and transmitting of the selected software ID and subscriber information to the provider for billing. The validation and accounting unit 1628 transmits accounting information to a provider accounting system 1630 via one or more links, one of which utilizes a secure public-switched telephone network (PSTN). A PSTN interface unit 1634 provides the interface from the validation and accounting unit 1628 to the PSTN 1632. The PSTN interface may be a modem or any other interface device commonly used to interface to the PSTN 1632. A corresponding PSTN interface unit 1636 provides a similar interfacing function of the provider accounting system 1630 to the PSTN 1632. Alternatively, the validation and accounting unit 1628 interfaces to the provider accounting system 1630 through an unsecure packet-switched global communication network (GCN) 1638. GCN interfaces 1640 and 1642 provide the interfacing functions for the respective subscriber and provider accounting systems 1628 and 1630.
It can be appreciated that, for the most part, programming for download of the software is very similar to the conventional programming procedures required for recording a TV program using a conventional VTR machine. The subscriber becomes aware of a particular software distribution by, for example, either viewing a weekly magazine or viewing a particular channel for upcoming software distributions. The basic parameters associated with each of the software distributions comprise the unique ID, time, date, and channel. Other parameters may be provided to enhance the download process for the subscriber, such as whether to enable or disable error checking, whether the download is to be used as a demonstration package (demo) for a fixed trial period, whether the billing should be through the subscriber's pay-TV provider or perhaps directly from a charge card, etc. Note that all of the components; the receiver 1608, channel selector unit 1611, listening interface 1616, controller 1618, programmer 1620, validation and accounting unit 1628, storage device 1622, and interfaces 1634 (and/or 1640) may be incorporated into one chassis.
Referring now to
Flow is to a decision block 1710 where an error detection algorithm determines if the downloaded software has been received error-free. This is an important function since flawed software files will not run properly on the user computer 1624. If the downloaded software has errors, flow is out the “N” path to a function block 1712 where a signal is sent to the listening device 1616 from the controller 1618 to download that particular software again. In that the bandwidth of the disclosed architecture is high, this process will cause little delay from the perspective of the user. If the downloaded software is error-free, flow is out the “Y” path of decision block 1710 to a function block 1714 where the unique software ID is transmitted to the software provider from the validation and accounting unit 1628 for accounting and billing purposes. Flow is then to a function block 1716 where the channel provider then bills the customer through normal subscriber billing and payment mechanisms. The process then ends at a Stop block.
It can be appreciated that the disclosed architecture can be implemented over the GCN 1638 using “webcasting.” Webcasting is the convergence of broadcasting with a packet-switched regime. Using a PC as a broadcast medium is coming into its own with advances in packet-switched broadcasting. Multicasting is a form of webcasting, which involves the simultaneous transmission of traffic to a designated subnet of users, rather than sending a separate stream of packets to each intended user (unicasting) or transmitting all packets to everyone (broadcasting). The recipient is simply instructing the computer's network interface card to listen to a particular IP address for the multicast. In other words, multiple copies of data are not sent across the network, and data is not sent to clients who do not request it. Therefore, a software provider can multicast particular applications at selected times to only those users (or subscribers) that request it.
Multicasting is like a push model of communication, i.e., radio or television, where those who want to receive the multicast tune their sets to the station they want to receive. Therefore, multicasts are announced in advance so that clients know when a multicast is available. A certain protocol supplies clients with all of the information needed to receive a multicast including its name, description, the time it is active, the media type (audio, video, text, etc.) that it uses, and the IP addresses, ports, and protocol it uses. The announcement information is multicast to a well-known IP address and port where clients running a session directory tool receive this information. To signal that a client wants to receive a multicast, the client joins a group to whom the multicast is directed. The client can join or leave the group at any time.
Referring now to
As illustrated in
Once the Software A package has been transmitted, comprised of the header 1802, the body 1804 and the trailer 1806, then a second package, a Software B package, is transmitted. This is comprised of a header 1808, a body 1810 and a trailer 1812. This Software B package is illustrated as being smaller than the Software A package, it being understood that each software package has a length defined by the software itself and independent of the other software packages. Once the Software B package has been transmitted, then a Software C package is transmitted, comprised of a header 1814, a body 1816 and a trailer 1818. It is noted that the Software C package is considerably larger than the Software A or the Software B package. This is important to the user, since the transfer of even large software packages is relatively fast. For example, if the communication channel could transmit at 1 Megabyte/second, then a 100 Megabyte file could be transmitted in slightly over one and one-half minutes. Smaller packages would take a fraction of a minute, this being the case with some update packages. However, utilizing conventional dial-up modems and transmitting over the global communication network 1638, these transfer rates can be as low as 4 Kilobytes/second.
In this illustrated example, there are only provided three software packages transmitted in sequence. Once the Software C package has been transmitted, then the Software A package is immediately re-transmitted, again comprised of the header 1802, body 1804 and trailer 1806. This will continue for a period of time. The reason for this is that, if an error occurs in receiving a package due to the error checking algorithm, then the transaction can be noted as being incomplete and merely waits for the next broadcast of the software to again attempt an error-free download operation. It is noted that this entire operation is completed without actually sending a request to the software vendor to process the software. However, it may be that a user would request a specialized piece of software from a particular vendor. If this vendor were allocated a certain amount of time on the software channel, such as from 9 p.m. to 9:15 p.m. on one day of the week, the software vendor may indicate to a user that the software will be placed on the software channel during that time period. The user need only ensure that the system is listening to the software channel at that time. Of course, the listening interface 1616 could always be active, since it will only download the software when it recognizes the presence thereof. It is noted that the software will be available for only a short period of time.
Referring now to
Once the filter parameters have been loaded, the listening device 1616 will monitor the software stream on a continuous basis, or during a period of time that the user desires to do such. For example, the user may have a removable storage device that is not loaded into the system and, therefore, would not want to download software without the ability to store this information. A decision block 1906 is operable to determine if the header of the desired software associated with the defined filter parameters has been received. If not, the program will continue back to the input of function block 1904 along an “N” path until the header for the desired software package is received. Once received, the program will flow along a “Y” path to a function block 1908 to initiate storage of the received data stream associated with the body of the software package within some type of storage, either on a hard disk or in another storage medium. It is indicated that the header is also stored, as the header may contain information as to billing, authorization codes, etc. However, this could also be contained within the trailer and only the body would be stored.
The program, during downloading thereof, as associated therewith some type of error checking, this typically being associated with any type of digital transmission channel. If an error is noted, as indicated by a function block 1910, it is possible to perform some type of error correction. If the error cannot be corrected, this would be a fatal error and the program would exit along a “Y” path. As long as no uncorrectable errors were detected, then the program will flow along an “N” path to a decision block 1912 to determine if the trailer has been received, i.e., whether the entire body of the software package has been received. If not, the program will flow along “N” path to a decision block 1914 to determine if a timeout operation has occurred. If so, the program will flow along a “Y” path. If not, the program will flow along an “N” path back to the input of function block 1908 to continue downloading the body of the data. Once the trailer has been received, or an error has been detected, or a timeout operation has been detected, the program will flow to a function block 1916 to terminate the storage operation and update the filter parameters. This updating operation of the filter parameters is one wherein it is noted that the desired software has been downloaded. This is necessary to ensure that it does not again receive the software and write over the already received software, which would require some type of write-over capability. Of course, this would not be necessary. Further, it may be that the filter parameters have some type of authorization code that allows the storage operation to be initiated. Once the software package has been downloaded, the program would indicate such, delete the authorization code and prevent further download of the software package at another time. Additionally, updating of the filter parameters indicates to the system that the software package has been successfully downloaded and, therefore, a billing transaction or some other database update action needs to be taken.
After the filter parameters have been updated, the program will flow to a decision block 1918 to determine if the transaction needs to be recorded as billing, etc. If this is a transaction which is required to be billed, it will be noted as such and the information forwarded to either some type of central clearinghouse or to a memory location for later downloading to a central clearinghouse. This is very similar, as described hereinabove, to digital T.V. networks, wherein access to a given channel at a defined time will trigger a billing event that is stored and later retrieved such that the user can be billed for a pay-for-view program. Further, it may be that the vendor, once the package has been downloaded to a particular user, would require some information as to what user downloaded the information. In the system, there could be provided a profile of the user, which profile is provided to a vendor at a later time. The information that would be transferred to the vendor would be information from the header indicating the software that was downloaded, the user's profile and the time of download. This could be placed in the vendor's database for purposes of later update information and notifications to the user.
Once it has been determined that the transaction must be recorded as a billing transaction, an update transaction, etc., the program will flow along a “Y” path from the decision block 1918 to a function block 1920 to access the information in the header and/or trailer of the downloaded software package. This will provide information as to the software package that was downloaded, any authorization codes required, etc. This will be then transferred to the billing/transaction package to handle all billing aspects thereof, as indicated in a function block 1922. The program will then flow to an End block 1924. If there is no recording transaction required, i.e., the software package is provided for the purpose of a defined period of time for review or it is actually a free software package, as a number of software packages are, the program will flow from the decision block 1918 along a “N” path to the End block 1924.
Referring now to
The program will then flow to a function block 2010 to determine if the software package has been retrieved; this is noted by function blocks 1906 through 1916. Once completed, the program will flow along a “Y” path to a function block 2012 to effectively delete the authorization code from the system and then notify the software vendor that this has been received. The reason for this is that the authorization code is associated with the user and can only be utilized for a single download. To ensure that only this user can receive this download, the authorization code may be associated with a user ID which is built into the downloading system. Therefore, the header of the software would include therein an authorization code in combination with the user ID. The system would then compare this header requiring both the authorization code and the user ID to be transmitted, such that a comparison may be made internal to the system in the listing interface 1616 and, only upon a match for both the authorization code and the user ID in the header with the authorization code input by the user as a parameter and the built in ID in the system would allow such a download. This would prevent another user accessing the software with the same code.
Alternatively, upon download, there could be an immediate notification to the software provider to not transfer the software package again with that authorization code. Note the advantage of such a system is that a large group of users could be provided with the same authorization code with the internal ID of each system allowing discrimination between each one of the users. For example, the header could have associated therewith a defined authorization code with a plurality of user IDs associated therewith. Each system that receives the software, this being all of the systems that are tuned to the channel in a broadcast system, would examine each header that is received, and if the header constitutes the desired software, has associated therewith the approved authorization code and has associated therewith the associated user ID of the receiving system, this will constitute a match and allow downloading of the software package. This will allow a software vendor to merely update the software parameters in the outgoing data stream. This may take a certain period of time to update the data stream, but this is inconsequential due to the fact that the user merely enters the authorization code and, when the software package is noted by the listening interface 1616 as being present with the appropriate software header, authorization code and/or user ID embedded therein, the software package will be downloaded. Once the authorization code has been deleted and the notification performed or the transaction completed, the program will flow to an End block 2014.
Referring now to
Referring now to
Each E-Mail illustrated in
Referring now to
In summary, there is provided a software distribution system which uses a conventional broadcast TV system where selected software distributions are broadcast for subscriber download over selected broadcast channels on a periodic basis. The subscriber programs a receiver box with parameters comprising channel, time, software ID, and date information locating and identifying the desired software download. A local storage device receives and stores the software distribution for transfer at a later time. The receiver connects to the provider to transmit accounting and billing information corresponding to the downloaded software. The subscriber is then billed using standard pay-TV subscriber billing systems.
Although the preferred embodiment has been described in detail, it should be understood that various changes, substitutions and alterations can be made therein without departing from the spirit and scope of the invention as defined by the appended claims.